Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
A firewall between internal network segments improves security and reduces risk by:
An IT balanced scorecard is PRIMARILY used for:
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
A disaster recovery plan (DRP) should include steps for:
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
Which of the following should be an IS auditor's GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
When auditing the feasibility study of a system development project, the IS auditor should:
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following is an example of a preventive control for physical access?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following is the MAIN responsibility of the IT steering committee?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following is MOST important to include in security awareness training?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
The record-locking option of a database management system (DBMS) serves to.
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?